An n Emp Empir iric ical Ana naly lysis s of
- f Anon
nonymit ity in n Zcash
George Kappos, Haaroon Yousaf, Mary Maller, Sarah Meiklejohn University College London
Zcon0: 26/06/2018
An n Emp Empir iric ical Ana naly lysis s of of Anon nonymit - - PowerPoint PPT Presentation
An n Emp Empir iric ical Ana naly lysis s of of Anon nonymit ity in n Zcash George Kappos, Haaroon Yousaf, Mary Maller, Sarah Meiklejohn University College London Zcon0: 26/06/2018 What level of anonymity do users obtain by using
George Kappos, Haaroon Yousaf, Mary Maller, Sarah Meiklejohn University College London
Zcon0: 26/06/2018
2 of 23
3 of 23
Ingredients:
for linking user activity.
4 of 23
Transparent to Transparent Transparent to Private Private to Private Private to Transparent
5 of 23
Transparent to Transparent
Can often be deanonymised.
Private to Private
6 of 23
Transparent to Transparent
We did NOT deanonymised.
Private to Transparent Private to Private
Hides destination address, sender address, and payment amount.
7 of 23
Transparent to Private Private to Transparent
Hides destination address. Hides sender address.
8 of 23
9 of 23
10 of 23
11 of 23
12 of 23
pool.
so can be identified.
identified from coin generation transactions.
13 of 23
14 of 23
We could associate 69% of the activity surrounding the shielded pool with miners and founders, leaving 31% left as the anonymity set for regular users.
15 of 23
ZEC.
250 ZEC 250 ZEC 250 ZEC 250 ZEC 250 ZEC 250 ZEC
16 of 23
predictable fashion.
had over 100 recipients, with one of them belonging to a known mining pool. Transaction from explorer.zcha.in Image of mining pool distribution from explorer.zcha.in
17 of 23
18 of 23
and withdrawal transactions if they had exactly the same value and this particular value was unique in the whole blockchain.
pool.
already attributed to the founders and miners.
19 of 23
supposedly created by the NSA.
corresponded to TSB’s sale activity.
Price of monthly dump in ZEC.
20 of 23
change in a shielded address rather than a transparent address.
deposit addresses using standard bitcoin clustering techniques.
21 of 23
Recommendation Solutions in progress Do not rely on user or miner behaviour for security. Have a less recognisable pattern when withdrawing founders rewards. Try to help more people use the shielded functionality of Zcash. Ultimately, none of our heuristics would work on a fully anonymous system.
22 of 23
Recommendation Solutions in progress Do not rely on user or miner behaviour for security. Wallet upgrades. Have a less recognisable pattern when withdrawing founders rewards. Developers have already done this. Try to help more people use the shielded functionality of Zcash. One of the aims of the Sapling upgrade. Ultimately, none of our heuristics would work on a fully anonymous system. Weigh up the technical and legal consequences of a fully anonymous system.
23 of 23
Ultimately, none of our heuristics would work on a fully anonymous system. Weigh up the technical and legal consequences of a fully anonymous system. Shameless plug: follow our work on updatable and universal common reference strings for zk-SNARKs.